For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
Introduction to Electromagnetic Information Security
Yu-ichi HAYASHI Naofumi HOMMA
IEICE TRANSACTIONS on Communications
Publication Date: 2019/01/01
Online ISSN: 1745-1345
Type of Manuscript: INVITED SURVEY PAPER
Category: Fundamental Theories for Communications
EM information security, TEMPEST, side-channel attacks, fault analysis, hardware Trojan horse, electromagnetic compatibility,
Full Text: FreePDF(2.4MB)
With the rising importance of information security, the necessity of implementing better security measures in the physical layer as well as the upper layers is becoming increasing apparent. Given the development of more accurate and less expensive measurement devices, high-performance computers, and larger storage devices, the threat of advanced attacks at the physical level has expanded from the military and governmental spheres to commercial products. In this paper, we review the issue of information security degradation through electromagnetic (EM)-based compromising of security measures in the physical layer (i.e., EM information security). Owing to the invisibility of EM radiation, such attacks can be serious threats. We first introduce the mechanism of information leakage through EM radiation and interference and then present possible countermeasures. Finally, we explain the latest research and standardization trends related to EM information security.